Business of Information Technology  >   Business Management  >   Best Practices  >  

Security Best Practices

RSS Feed    Add to Google    Add to My Yahoo!
Security Best Practices Reports
76 - 100 of 1894 Matches Previous Page  |  Next Page
Demo: A Look Inside a Security Intelligence Platform
sponsored by IBM
VIDEO: In this video, you'll learn how to consolidate data from thousands of devices, endpoints and applications distributed throughout your network. You'll hear about how a security intelligence platform can replace dozens of point products helping you collect more information and make quicker decisions about threats in your network.
Posted: 16 Nov 2016 | Premiered: 10 Feb 2016

IBM

Demo video: How QRadar Works - IBM Security Intelligence and Analytics Whiteboard
sponsored by IBM
WEBCAST: This video shows you how to get greater network visibility and risk management out of your security solution. Discover how to instantly sense and detect a breach as it happens in real-time.
Posted: 16 Nov 2016 | Premiered: Feb 3, 2016

IBM

How Insiders Put Enterprise Data at Risk
sponsored by Imperva
VIDEO: Join Amichai Shulman, co-founder and CTO of Imperva, as he uncovers three categories of insider threats all security pros should be aware of. You'll also explore how expansive the attack can be surface for an ever-proliferating network, and how mobile devices, laptops, and desktops play a role.
Posted: 16 Nov 2016 | Premiered: 29 Mar 2016

Imperva

2016 Cyber Threat Defense Report
sponsored by Blue Coat Systems
RESOURCE: This infographic shows you the survey results from 1,000 security decision makers across 20 industries from 10 countries around the world. You'll learn stats and figures on how vulnerable they believe they are, which devices are most difficult to secure and security tools they think they need for the future.
Posted: 16 Nov 2016 | Published: 31 Oct 2016

Blue Coat Systems

2016 Global Cyber Threat Defense Report
sponsored by Blue Coat Systems
RESOURCE: This cyber threat defense report aims to inform the IT security community about how their global peers are defending against threats and changes they expect to make moving forward.
Posted: 16 Nov 2016 | Published: 31 Oct 2016

Blue Coat Systems

Discover SIEM Capabilities For Real-Time Analysis
sponsored by LogRhythm, Inc.
EGUIDE: In this expert e-guide, learn what 3 SIEM capabilities aid the real-time analysis of collected information and security alarms, allowing for prompt detection of actual or potential attacks.
Posted: 16 Nov 2016 | Published: 16 Nov 2016

LogRhythm, Inc.

The Case for Modern Network Security Operations
sponsored by Forcepoint
WHITE PAPER: In this ESG white paper, examine how network security operations are completely fraught with challenges that need to be met in order for your organization to effectively protect itself.
Posted: 16 Nov 2016 | Published: 30 Sep 2016

Forcepoint

Securing Hybrid Networks for Dummies
sponsored by Forcepoint
EBOOK: Discover how to secure digital networks and take a deep dive into complex infrastructures that deploy various methods of connectivity. Learn how to understand a next-generation network, run an efficient hybrid network, manage hybrid connection challenges, and more.
Posted: 16 Nov 2016 | Published: 16 Nov 2016

Forcepoint

2016 Cyber Threat Defense Report
sponsored by Blue Coat Systems
WHITE PAPER: In this cyber threat report, you'll discover how IT security professionals perceive today's cyber threats and plan to defend against new threats moving forward.
Posted: 16 Nov 2016 | Published: 31 Oct 2016

Blue Coat Systems

Making DDoS Mitigation Part of Your Incident Response Plan - Critical Steps and Best Practices
sponsored by Akamai
WHITE PAPER: The time to prepare yourself for a DDoS attack was yesterday. Discover why distributed denial of service (DDoS) attacks are so damaging to organizations and understand what you can do to protect your company today.
Posted: 16 Nov 2016 | Published: 31 Oct 2016

Akamai

Barbarians at the Gate - Shoring Up Web Application Defenses with Client Reputation
sponsored by Akamai
WHITE PAPER: Web application firewalls (WAFs) have become increasingly useful in mitigating cyberthreat risk to online assets for many companies. Learn how this and other cloud security approaches should be used in combination as part of your comprehensive defense strategy.
Posted: 16 Nov 2016 | Published: 31 Oct 2016

Akamai

Biometrics: A Modern Method Of Authentication
sponsored by Comarch
WHITE PAPER: Get a thorough understanding of biometrics and how it can serve as an effective method of user authentication for your organization's security strategy.
Posted: 16 Nov 2016 | Published: 16 Nov 2016

Comarch

Modern Cybercrime - What's Happening, Why it's Happening and How You Can Respond
sponsored by Trustwave
WHITE PAPER: Learn about recent instances of cyberattacks to better understand how they operate and what damage they cause. Stay ahead of cybercriminals and out of tomorrow's headlines by ensuring you're operating securely and your incident response plan is ready for prime time.
Posted: 16 Nov 2016 | Published: 31 Oct 2016

Trustwave

RWTH Aachen University
sponsored by Forcepoint
CASE STUDY: Learn how RWTH Aachen University was able to protect its network of over 40,000 student users from malware attacks, while ensuring high performance and availability, through the implementation of a next generation firewall.
Posted: 15 Nov 2016 | Published: 15 Nov 2016

Forcepoint

Mitigating The Impact of Critical IT Events
sponsored by Splunk
RESOURCE: In this infographic, learn more about the damage caused by CIEs and how you can mitigate the costs associated with downtime, boost productivity, and improve visibility into operations.
Posted: 15 Nov 2016 | Published: 15 Nov 2016

Splunk

Web App Firewall Evaluations: Get the Results and Hear Customer Insights
sponsored by Imperva
WEBCAST: This 2016 analysis for web application firewall (WAF) tools reviews 16 vendors and is based on detailed responses to questionnaires from experienced WAF customers. Uncover the experiences of participants in this research, and how they implemented WAF technologies to protect their applications and critical data.
Posted: 15 Nov 2016 | Premiered: Aug 26, 2016

Imperva

Giving IT a Secure, Common Platform for Extending the Data Center to the Cloud
sponsored by Check Point Software Technologies Ltd.
WHITE PAPER: IT must tailor security tools to protect public and hybrid cloud environments, allowing the enterprise to confidently extend their data center applications and workflows to the cloud and connect them securely. Access this white paper and uncover secure, dedicated cloud computing services.
Posted: 15 Nov 2016 | Published: 15 Nov 2016

Check Point Software Technologies Ltd.

Real World Security Risks Embedded In Your Cloud Strategy
sponsored by Blue Coat Systems
RESOURCE: Learn how to harness the cloud and mitigate the many risks associated with it. Discover how the cloud fits in with current IT industry trends, who is using the cloud (hint: over 50% of the Fortune 500), the top 3 cloud threats, and more.
Posted: 15 Nov 2016 | Published: 15 Nov 2016

Blue Coat Systems

Evaluation Checklist: Managed Security Services Provider
sponsored by Trustwave
WHITE PAPER: Discover what you should expect out of your next Managed Security Service Provider (MSSP) with this evaluation checklist. This tool will help you compare and contrast potential MSSP's so you can best decide which one best suits your needs
Posted: 15 Nov 2016 | Published: 31 Oct 2016

Trustwave

Managed Security Services Provider (MSSP) Decision Guide
sponsored by Trustwave
WHITE PAPER: What key areas should you be thinking about when making the critical decision to ally with a Managed Security Service Provider (MSSP)? This decision guide offers key questions and considerations to help you select an MSSP and evaluate their solutions to best secure your business.
Posted: 15 Nov 2016 | Published: 31 Oct 2016

Trustwave

7 Steps to Protect Your Data Against Insider Threats
sponsored by Imperva
WHITE PAPER: Security teams can use this checklist to evaluate their current data security program and identify gaps pertaining to insider threats. Uncover a side-by-side list of ways to protect data and contain these threats.
Posted: 15 Nov 2016 | Published: 15 Nov 2016

Imperva

Threats and Mitigations: A Guide to Multi-Layered Web Security
sponsored by Akamai
EBOOK: Discover the various types of threats that plague internet resources, the necessary elements of an adequate web security tool, and the options available to you. Plus, learn 5 steps to improve your web application security profile.
Posted: 15 Nov 2016 | Published: 31 Oct 2016

Akamai

5 Ways to Achieve Big Data Protection
sponsored by Commvault
WHITE PAPER: Take a look at 5 key issues you must consider as you begin to embrace Big Data protection. Discover why organizations see Big Data protection as a huge challenge and learn the best strategies for protecting Big Data assets the same as you would "regular" data assets.
Posted: 15 Nov 2016 | Published: 31 Oct 2016

Commvault

The Security Champion's Guide to Web Application Security
sponsored by Akamai
WHITE PAPER: Learn about web application firewalls (WAFs) and how to apply them effectively such as considering whether a WAF is appropriate for your web application security, how to baseline your existing WAF against a set of recommended criteria, generate ideas for extending an existing WAF and improving web application security, and more.
Posted: 14 Nov 2016 | Published: 14 Nov 2016

Akamai

RoundTower Technologies Protects its Customer's SDN: Video Case Study
sponsored by Check Point Software Technologies Ltd.
VIDEO: Discover how to deliver dynamic orchestration of advanced threat prevention for all traffic in the software-defined data center, with additional multi-layered defense used to secure east-west traffic within VMware-deployed data centers. Tune in now to see more.
Posted: 14 Nov 2016 | Premiered: 13 Jun 2016

Check Point Software Technologies Ltd.
76 - 100 of 1894 Matches Previous Page    2 3 4 5 6 7    Next Page
 
Visit WhatIs.com - a knowledge exploration and self-education tool about information technology.

About TechTarget:

TechTarget provides enterprise IT professionals with the information they need to perform their jobs - from developing strategy, to making cost-effective IT purchase decisions and managing their organizations' IT projects - with its network of technology-specific Web sites, events and magazines

All Rights Reserved, Copyright 2000 - 2016, TechTarget | Read our Privacy Statement